Agenda

This Fusion Executive Summit will explore how IT has become a critical boardroom resource for identifying enterprise cyber risk and deploying defensible levels of security for innovative digital business success.

Continental Breakfast

Introductions

Governance and Planning for Cyber Security – How Can Private and Public Sectors Collaborate on Threats and Responses

9:25 – 9:45 am

Networking Break

9:50 – 10:30 am

IT Risk and Security Governance in the Digital Business

Digital business presents CIOs and business leaders with unprecedented governance challenges, nowhere more so than in the realms of information risk and security. Join Rick Roy, Executive Partner, Gartner for a interactive discussion on pragmatic frameworks to deal with these new challenges.

10:35 – 11:25 am

Paddling in Turbulent Waters, the Need for Collaboration Between the CIO & CFO on the Cyber Risk Agenda

Cyber breaches continue to occur at an alarming clip, faster than even the most aggressive organization can adapt. Meanwhile, companies are accelerating their investment in digital business initiatives, creating a significant need for collaboration between the CIO and CFO. Despite these challenges, there is a pragmatic path forward to addressing this key risk area.

Join Fawaad Khan, Executive Director, Cyber Security and Scott Redlinger, EY Executive Director for a practical discussion of what CFOs and CIOs can do immediately to strengthen their organizations’ risk postures related to cyber threats. This interactive discussion will cover the following areas, as well as other special topics as desired by attendees:

The state of cybersecurity – surprising real-life anecdotes that haven’t made the press, from practitioners involved in large, public breaches

Current board-level concerns and how organizations across all sectors, including critical infrastructure, are responding

Current risk transfer/mitigation mechanisms and strategies for deployment

How organizations are prioritizing spending and maximizing return on cybersecurity investments

The nature and value of CFO/CIO collaboration around cybersecurity strategy and road-mapping

Networking Break

11:50 – 12:35 pm

Cyber Liability – the Risk and Solutions

How forward-thinking companies are taking proactive steps to explore and transfer cyber risk

Cyber risk has become a leading issue for many organizations. In an increasingly punitive legal and regulatory environment, and in the face of more frequent contractual insurance requirements specifying cyber liability, forward-thinking companies are taking proactive steps to explore and transfer cyber risk. Join the conversation with subject matter experts on risk and protection.

This session will cover:

When should organizations be concerned about their cyber risk exposure?

How do organizations transfer cyber risk?

Why are standard insurance policies not enough?

What is the scope of today’s cyber coverage?

How do you identify and analyze exposures, risk, and potential insurance needs, including proposed structures?

How can you manage risk to lower premiums?

What are the alternative solutions?

12:35 – 1:35 pm

Lunch

Major research universities are increasingly coming under cyberattack. They are being attacked by foreign governments millions of times a week. No universities are immune as evidenced by recent breaches at Stanford, University of California campuses, Harvard, Maryland, Penn State, and Virginia, to name just a few. Like businesses, we have to balance our investments within the context of increasing cost containment pressures and increasing threats.

A significant part of the unique challenge at universities is the massive amount of intellectual property on campus is behind the numerous patents filed yearly, from engineering to biotechnology to computer chips. While corporations also have intellectual property, a key difference is that Research universities are renowned for their openness and knowledge exchange. The commercial value created by these innovations brings trillions of dollars back to our economy.

The defense and response against these attacks on campus raises many technology and cultural challenges that are often at odds with one another. Bruce Maas, Vice Provost for IT and CIO and Bob Turner, Chief Information Security Officer, will share information, experiences and best practices from educating users to sophisticated use of technology. And share stories of some surprises along this long and complicated journey.

2:20 – 3:05 pm

Networking Break

Embed security into the heart of your business processes and secure company data wherever it may reside.

Navigating and surviving fast-moving disruptive business models depends on business agility and cost savings. This means using cloud technologies to launch new products and services, developing self-service portals and mobile apps to retain and attract customers who expect to complete transactions instantly by connecting to back-end systems. At the same time, cyber attacks have become more numerous and sophisticated.

Financial services companies need a strategy that embeds information security into the heart of their global business processes and operations, and secures company data wherever it may reside. It wasn’t long ago that companies felt secure if their perimeter was secure, but with today’s technologies, security concerns go well beyond protecting internal systems. They extend all the way to cyberspace. Join the discussion with experts in financial services to discuss:

Identify, prioritize and manage risk relative to its potential impact on mission-critical operations so you can balance security needs against cost considerations, business success plans, and the need to maintain organizational agility

Establishing a taxonomy and dictionary of communications so that stakeholders are asking the right questions

Developing a complete view of any vulnerabilities that may arise across the enterprise

4:05 – 4:55 pm

An Epic Perspective: Security Practices Must Be Built-In, Not Bolted-On

Cybersecurity is a significant issue for healthcare data and information systems. Its importance touches all U.S. critical infrastructures. No checklist can adequately describe all that must be done to establish an organization’s security culture, but there are some obvious steps that must be taken. Ensuring the privacy and security of health IT can help patients achieve their health goals. Everyone has a role in protecting patient privacy and securing health information. Join the conversation with subject matter experts from Electronic Medical Records provider, Epic.

This discussion will cover:

Business Continuity – the why, what, and how; focusing on table stakes